Nachaat Mohamed

Orcid: 0000-0002-4202-1294

According to our database1, Nachaat Mohamed authored at least 14 papers between 2021 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Artificial intelligence and machine learning in cybersecurity: a deep dive into state-of-the-art techniques and future paradigms.
Knowl. Inf. Syst., August, 2025

Enhancing Spear Phishing Defense with AI: A Comprehensive Review and Future Directions.
EAI Endorsed Trans. Scalable Inf. Syst., 2025

2024
AI in Combatting Man-in-the-Middle Attacks: A Comprehensive Review.
Proceedings of the 15th International Conference on Computing Communication and Networking Technologies, 2024

Botnet Detection: A Review of Machine Learning and AI Strategies.
Proceedings of the 15th International Conference on Computing Communication and Networking Technologies, 2024

A Review of AI Approaches in Combating Advanced Persistent Threats (APTs) in Cybersecurity.
Proceedings of the 15th International Conference on Computing Communication and Networking Technologies, 2024

DDoS Attacks Mitigation: A Review of AI-Based Strategies and Techniques.
Proceedings of the 15th International Conference on Computing Communication and Networking Technologies, 2024

Renewable Energy in the Age of AI: Cybersecurity Challenges and Opportunities.
Proceedings of the 15th International Conference on Computing Communication and Networking Technologies, 2024

A Comprehensive Review of Natural Language Processing Techniques for Malware Detection.
Proceedings of the 15th International Conference on Computing Communication and Networking Technologies, 2024

Artificial Intelligence in Cybersecurity: A Review of Solutions for APT-Exploited Vulnerabilities.
Proceedings of the 15th International Conference on Computing Communication and Networking Technologies, 2024

2023
Comprehensive Review of Advanced Machine Learning Techniques for Detecting and Mitigating Zero-Day Exploits.
EAI Endorsed Trans. Scalable Inf. Syst., 2023

Artificial Neural Networks-Based Torque Distribution for Riding Comfort Improvement of Hybrid Electric Vehicles.
Proceedings of the International Conference on Machine Learning and Data Engineering, 2023

Transforming Leadership Practices through Artificial Intelligence.
Proceedings of the International Conference on Machine Learning and Data Engineering, 2023

2022
Study of bypassing Microsoft Windows Security using the MITRE CALDERA Framework.
F1000Research, 2022

2021
SBI Model for the Detection of Advanced Persistent Threat Based on Strange Behavior of Using Credential Dumping Technique.
IEEE Access, 2021


  Loading...